Timing is Everything
Nov. 21st, 2007 11:56 amThis week's topic in my IT Law course is - wait for it - data protection.
As part of my homework, I've just read the Data Protection Act (yes, the exciting, sexy life of an IP/IT lawyer-to-be!). Schedule 1, Article 7:
"Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data."
Schedule 2 amplifies this as follows:
"Having regard to the state of technological development and the cost of implementing any measures, the measures must ensure a level of security appropriate to—
(a)the harm that might result from such unauthorised or unlawful processing or accidental loss, destruction or damage as are mentioned in the seventh principle, and
(b)the nature of the data to be protected.
The data controller must take reasonable steps to ensure the reliability of any employees of his who have access to the personal data."
I'll leave it as an exercise for the reader to comment on whether bunging a CD with 25 million records on it in the routine mail was either use of suitable security measures or the act of a reliable employee.
As part of my homework, I've just read the Data Protection Act (yes, the exciting, sexy life of an IP/IT lawyer-to-be!). Schedule 1, Article 7:
"Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data."
Schedule 2 amplifies this as follows:
"Having regard to the state of technological development and the cost of implementing any measures, the measures must ensure a level of security appropriate to—
(a)the harm that might result from such unauthorised or unlawful processing or accidental loss, destruction or damage as are mentioned in the seventh principle, and
(b)the nature of the data to be protected.
The data controller must take reasonable steps to ensure the reliability of any employees of his who have access to the personal data."
I'll leave it as an exercise for the reader to comment on whether bunging a CD with 25 million records on it in the routine mail was either use of suitable security measures or the act of a reliable employee.
no subject
Date: 2007-11-21 12:04 pm (UTC)Could you warn us about upcoming topics so we can take appropriate precautions, especially if any of them involve alien invasions, Cthulhuoid horrors or the end of civilization?
no subject
Date: 2007-11-21 12:17 pm (UTC)Semester 2 topics are currently scheduled as follows:
Week 1 IP protection for software
Week 2 Open Licences
Week 3 Intellectual Property in Cyberspace 2: P2P and downloading
Week 4 Digital Rights Management
Week 5 Trade Marks, the Internet and Domain Names
Week 6 Web 2.0
Week 7 Competition
Week 8 Human Rights
Week 9 Cybercrime (class exercise)
Week 10 Virtual Law
That should cover most angles...
no subject
Date: 2007-11-21 01:32 pm (UTC)Up until week 6 there'll be a series of government and corporate attacks on open source and creative commons licenses, culminating in a trade-mark-based attack on the internet as a whole with most domain names being taken off line in the name of preventing file sharing and IP theft.
After that the privatized national database systems maintained by different companies will be cross linked via an enterprising FaceBook programmer allowing rampant abuse of human rights by both government and corporations and mass exploitation of security loopholes by organised and disorganised online criminals.
But in the end, the law rides to our rescue as
You can tell I've been awake for rather too long, can't you?
no subject
Date: 2007-11-21 02:15 pm (UTC)Well, that's one way of funding the course...
no subject
Date: 2007-11-21 01:05 pm (UTC)There are always exceptions: mailing the Hope Diamond was a reasonable choice precisely because nobody expected it. And no system is 100% safe against accident, but fire damage is irrelevant here, because they can make another CD.
no subject
Date: 2007-11-21 06:35 pm (UTC)Not surprised that it was just posted as 'standard': not registered, special delivery, proof of delivery or anything like that. So, no way to track it or insure it. Grannies I can understand but an official H.M. Government office? Well, okay... it seems to go without saying these days.
no subject
Date: 2007-11-21 03:27 pm (UTC)no subject
Date: 2007-11-21 07:44 pm (UTC)It begs the question of just how many HMRC staff have access to these sorts of datasets other than in very controlled circumstances. How low down the totem pole can you go before permissions to copy and burn the entire 25 MILLION record dataset are refused? The tea-lady?
I do contract IT engineering work for financial companies, big ones. I've got privileged accounts on their main data systems but I'm not allowed anywhere near the real data. For one thing, serious amounts of money are involved and for another there are laws with teeth in them to ensure the financials look after personal data very carefully. It seems the Government in their wisdom have not applied the strictness they demand of commercial entities to their own endeavours. This bodes ill, of course, for the ID scheme but it also should give pause to those supporting stricter passport rules etc.
no subject
Date: 2007-11-21 08:13 pm (UTC)